Sciweavers

5891 search results - page 189 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CNIS
2006
15 years 6 months ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues
COLCOM
2005
IEEE
15 years 10 months ago
Distributed on-line Bayesian search
In this paper, we outline the basis for a new distributed Bayesian search scheme in which all Bayesian decision makers recognize the same performance objective but do not possess ...
Alfredo Garcia, Enrique Campos, Chenyang Li
132
Voted
PADS
1998
ACM
15 years 8 months ago
Fault-Tolerant Distributed Simulation
In traditional distributed simulation schemes, entire simulation needs to be restarted if any of the participating LP crashes. This is highly undesirable for long running simulati...
Om P. Damani, Vijay K. Garg
CSFW
2008
IEEE
15 years 11 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 9 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann